Vulnerabilities > CVE-2002-0332 - Remote Buffer Overflow vulnerability in Xtell 1.91.1/2.6.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflows in xtell (xtelld) 1.91.1 and earlier, and 2.x before 2.7, allows remote attackers to execute arbitrary code via (1) a long DNS hostname that is determined using reverse DNS lookups, (2) a long AUTH string, or (3) certain data in the xtell request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | xtell 1.91.1/2.6.1 Multiple Remote Buffer Overflow Vulnerabilities. CVE-2002-0332. Remote exploit for linux platform |
id | EDB-ID:21309 |
last seen | 2016-02-02 |
modified | 2002-02-27 |
published | 2002-02-27 |
reporter | spybreak |
source | https://www.exploit-db.com/download/21309/ |
title | xtell 1.91.1/2.6.1 - Multiple Remote Buffer Overflow Vulnerabilities |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-121.NASL |
description | Several security related problems have been found in the xtell package, a simple messaging client and server. In detail, these problems contain several buffer overflows, a problem in connection with symbolic links, unauthorized directory traversal when the path contains |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14958 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14958 |
title | Debian DSA-121-1 : xtell - buffer overflow, symlink problem, '..' directory traversal |
code |
|